Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall
When we do SEO, most people are using normal methods to optimize the site, there are individual people want to make a quick effect, so use some of the search engine in violation of the means, and quickly put the rankings to do, but this ranking will not be very stable, when the search engine found that you used illegal methods, Next search engine will not hesitate to put your site in the search engine k off, this method is commonly called Black hat, and now do SEO market most people know that there are three ways to optimize, one is the white hat is to use the normal optimization method to do optimization, although the optimization time is relatively long, but when the rankings do go up later, As long as regular maintenance, it is difficult to down, the second is Red Hat, is also a recent appearance of a technique, that is, go to some search engine black hat to do optimization, go up the effect is very fast, and do not necessarily will be after the search engine k off, but by K's website will have, so Red hat is not very safe And, finally, what I've just said about the search engine's way of judging illegal methods, this method is known as Black Hat, and now there are many new SEO novice, do not know what the Black Hat method includes, may be a careless of their own site will disappear in the search engine, so this chapter I introduce some Black hat methods have which, Remind the proficient not to use, to remind the novice not to offend, well said so much, the following to introduce the Black Hat method includes what, their characteristics are?
Hidden links
The first black Hat method introduced first is called Hidden Link, is to put your connection hidden in the code, and do not appear in the front of the Web page, such a method has a lot of novice friends will be offended, if your site has done a hidden link, suggest you drive to remove hidden links, Lest search engines find k off your site.
Second, the keyword camouflage
Some friends will ask what is the keyword camouflage? Probably is you choose a keyword to do go up, and your this page content extracts the key words and this already did go up the keyword is irrelevant. The meaning of the search engine to see and users see is different things, so we must go to avoid.
Three, the bridge page, the door page
Bridge page and Door page This is one of the usual black hat methods, as an optimization, the bridge page will be dedicated to do a page, all embedded keywords, and keyword all bold plus hyperlink to the home page, is to improve the rate of keyword occurrence, and the rapid effect of scissors, this method is relatively fast, But search engines will also seize such sites.
Iv. Paid Links
Pay links I will not say, we all know that the meaning of paid links is that we buy the black chain, that is, the purchase of high PR links, the search engine for such a connection although rarely check, but once you find, your site will be search engine k off, So when we buy links, we must choose a safe connection address, this is the best.
V. Mass TOOLS
Do SEO friends know mass tools, and a lot of people are in use, such as mass blog, forum mass even search engine product mass tools, in fact, when we use mass tools can be a little bit less, lest search engine found, but not a day hair too much, So the search engine will be directly sealed off your site, so that your site can never be turned over.
Vi. Spider Traps
Spider traps are also one of the usual black hat methods, is to use some dynamic site code, write a wireless cycle of the page, making spiders crawl in this infinite cycle in the cycle, which will make their own site quickly improve rankings, but also to our site to bring disaster, so we do not use.
Keywords stack
Some of the proficient in the key words are known, in the past, our site will be piling up a lot of keywords, whether it is to do the keyword and do not do the keyword, we have to stack, in fact, this method is not good, now for the keyword-piling site, search engine opportunities are not to crawl information, So we can use SEO secondary navigation instead of keyword piling, this can improve the weight of the homepage, also can improve the ranking of our website.
VIII. website Mirroring
Maybe some friends don't know much about the image of the website, that is to say that you use a website code, copied several websites, and do keyword, so that is a site mirroring, search engines to avoid the location of the keyword is a sweep of the site, for the image of the punishment is very ruthless, not only k off your site, and permanently sealed off your domain name and server address, all the sites in the server will follow the bad luck.
Ix. Web Hijacking
Web hijacking is also one of the black cat methods, and for the Web page hijacked search engine is also very tired, especially when spiders crawl a site, the Web page can not open or malicious not to let spiders into words, such cases, search engines once found to be unfriendly to search engines, so may direct k off your site, So don't do web hijacking.
X. False Links
We all know that spiders are distributed according to the connection address, for the false connection spider is very annoying, such as this is a page, when the spider went in, in addition to the key words of nothing else, so spiders will be forced to crawl and included, although the spider can not identify your site is false connection, But once the search engines find out, your site will also be k off.
This introduction this 10 kinds of black hat method for everybody, I hope the above black hat methods you must remember not to touch, or in our use as much as possible to control our usage, so that the search engine will not trigger your site, and if you feel that you do not understand or understand, You can join our QQ group to communicate and can contact me, QQ group number: 150191080, welcome like-minded friends to exchange learning, welcome to the practice to discuss, welcome to share our experience method to everyone. This article from the Shenzhen Waste Recycling www.yd668.net Original, if reproduced please indicate the source, please support the original, thank you.